TY - GEN
T1 - Security impacts of virtualization on a network testbed
AU - Huang, Yu-Lun
AU - Chen, Borting
AU - Shih, Ming Wei
AU - Lai, Chien Yu
PY - 2012
Y1 - 2012
N2 - Modern virtualization technologies provides an optimal use of underused hardware resources by sharing them among virtual machines hosted on the same physical machine. These technologies hence have been broadly adopted in many areas, such as server consolidation, virtualized network testbeds, etc. A large-scale network testbed is considered one of the useful tools for evaluating or verifying advanced networking technologies. To construct a network testbed that matches as much as a real setup, the testbed should meet requirements of isolation, fidelity, repeatability, scalability, containment and extensibility. Among these requirements, scalability can be realized by the modern virtualization technology, whereas vulnerability and security weakness brought along with virtualization can also be harmful to the other requirements of a network testbed, like isolation and fidelity. This paper reviews the modern virtualization technologies, their resource management mechanisms, and the known attacks of these virtualization technologies. Then, we discuss the requirements of existing network testbeds and the security impacts when introducing such modern virtualization technologies into a network testbed.
AB - Modern virtualization technologies provides an optimal use of underused hardware resources by sharing them among virtual machines hosted on the same physical machine. These technologies hence have been broadly adopted in many areas, such as server consolidation, virtualized network testbeds, etc. A large-scale network testbed is considered one of the useful tools for evaluating or verifying advanced networking technologies. To construct a network testbed that matches as much as a real setup, the testbed should meet requirements of isolation, fidelity, repeatability, scalability, containment and extensibility. Among these requirements, scalability can be realized by the modern virtualization technology, whereas vulnerability and security weakness brought along with virtualization can also be harmful to the other requirements of a network testbed, like isolation and fidelity. This paper reviews the modern virtualization technologies, their resource management mechanisms, and the known attacks of these virtualization technologies. Then, we discuss the requirements of existing network testbeds and the security impacts when introducing such modern virtualization technologies into a network testbed.
UR - http://www.scopus.com/inward/record.url?scp=84866695348&partnerID=8YFLogxK
U2 - 10.1109/SERE.2012.17
DO - 10.1109/SERE.2012.17
M3 - Conference contribution
AN - SCOPUS:84866695348
SN - 9780769547428
T3 - Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012
SP - 71
EP - 77
BT - Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012
T2 - 2012 IEEE 6th International Conference on Software Security and Reliability, SERE 2012
Y2 - 20 June 2012 through 22 June 2012
ER -